Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/CSF.2008.8guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

DKAL: Distributed-Knowledge Authorization Language

Published: 23 June 2008 Publication History

Abstract

DKAL is a new declarative authorization language for distributed systems. It is based on existential fixed-point logic and is considerably more expressive than existing authorization languages in the literature. Yet its query algorithm is within the same bounds of computational complexity as e.g. that of SecPAL. DKAL's communication is targeted which is beneficial for security and for liability protection. DKAL enables flexible use of functions; in particular principals can quote (to other principals) whatever has been said to them. DKAL strengthens the trust delegation mechanism of SecPAL. A novel information order contributes to succinctness. DKAL introduces a semantic safety condition that guarantees the termination of the query algorithm.

Cited By

View all
  • (2017)A Datalog Framework for Modeling Relationship-based Access Control PoliciesProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078871(91-102)Online publication date: 7-Jun-2017
  • (2016)Distributed autoepistemic logic and its application to access controlProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060621.3060800(1286-1292)Online publication date: 9-Jul-2016
  • (2016)SMT-based Enforcement and Analysis of NATO Content-based Protection and Release PoliciesProceedings of the 2016 ACM International Workshop on Attribute Based Access Control10.1145/2875491.2875493(35-46)Online publication date: 11-Mar-2016
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSF '08: Proceedings of the 2008 21st IEEE Computer Security Foundations Symposium
June 2008
318 pages
ISBN:9780769531823

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 June 2008

Author Tags

  1. Datalog
  2. Datalog with constraints
  3. access control
  4. authorization
  5. distributed knowledge
  6. existential fixed-point logic
  7. infon
  8. information leakage
  9. security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2017)A Datalog Framework for Modeling Relationship-based Access Control PoliciesProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078871(91-102)Online publication date: 7-Jun-2017
  • (2016)Distributed autoepistemic logic and its application to access controlProceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence10.5555/3060621.3060800(1286-1292)Online publication date: 9-Jul-2016
  • (2016)SMT-based Enforcement and Analysis of NATO Content-based Protection and Release PoliciesProceedings of the 2016 ACM International Workshop on Attribute Based Access Control10.1145/2875491.2875493(35-46)Online publication date: 11-Mar-2016
  • (2016)AppPAL for AndroidProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_14(216-232)Online publication date: 6-Apr-2016
  • (2015)Separation of powers in the cloud: where applications and users become peers2015 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software (Onward!)10.1145/2814228.2814237(76-89)Online publication date: 21-Oct-2015
  • (2015)GuardatProceedings of the Tenth European Conference on Computer Systems10.1145/2741948.2741958(1-16)Online publication date: 17-Apr-2015
  • (2015)The complexity of primal logic with disjunctionInformation Processing Letters10.1016/j.ipl.2015.01.003115:5(536-542)Online publication date: 1-May-2015
  • (2015)Automatically reasoning about metamodelingSoftware and Systems Modeling (SoSyM)10.1007/s10270-013-0315-y14:1(271-285)Online publication date: 1-Feb-2015
  • (2014)AmuletProceedings of the 1st Workshop on Mobile Medical Applications10.1145/2676431.2676432(16-21)Online publication date: 3-Nov-2014
  • (2014)Fail-Secure Access ControlProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660307(1157-1168)Online publication date: 3-Nov-2014
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media